About Checktxt: Pioneering Human-Centric SMS Security

Delivering privacy-first, intelligent SMS fraud protection—so organizations can empower people to communicate, connect, and live confidently in a digital world.

Our Story

Checktxt began with a realization — one that felt both obvious and overlooked.

Every year, companies spend millions protecting their networks, their data, and their reputations. They buy tools to stop ransomware, block phishing, and keep hackers out. But somewhere along the way, they forgot about the people behind those firewalls — their employees and their customers.

Inside the company walls, emails are scanned, filtered, and secured. But outside?

Personal inboxes and text messages — where people live, work, and communicate every day — have become the new front line of fraud. Messages pretending to be from trusted names, urgent donation requests, or fake delivery notices — these aren’t just scams; they’re attacks on trust.

It wasn’t that companies didn’t care. Protecting those channels was just too hard — too expensive, too complicated, too full of privacy risks. So most did nothing.

Checktxt was built to change that.

We designed a way to protect people without invading their privacy. No accounts. No complicated integrations. Just instant, intelligent fraud detection that keeps everyone safer — from the inside out.

And because our solution is easy to brand and share, it lets companies send a powerful message to the world:
We don’t just protect our systems. We protect our people.

Our Mission

To protect people, not just systems. Checktxt empowers organizations to keep their employees and customers safe from SMS fraud with a simple, privacy-first solution that works instantly — no apps, no complexity, no compromise.

Our Vision

A world where people can trust their text messages again, where digital communication enhances human connection rather than creating anxiety about potential threats.

Core Values

Checktxt Reviews: What Our Users Say

Individual User Testimonials

Leadership: Experienced Cybersecurity Innovators

Jack Marshall, Co-founder & CEO

Serial Entrepreneur | Security Innovator | Customer Success Champion

Jack brings over 20 years of cybersecurity leadership experience to Checktxt, having held key positions at industry-leading security companies including Fortify (HP), AlienVault (AT&T), Prevoty (Imperva), and Contrast Security.

Background:

  • Founded Photoloft.com in 1998, pioneering photo sharing before social media existed
  • Successfully took company public before Canon acquisition
  • Former CEO of Bolster with funding from M12 (Microsoft) and Cross Link Capital
  • Customer Success expertise embedded throughout Checktxt‘s DNA

Philosophy:

At Checktxt, we believe protection should extend beyond networks — it should protect people.

Corporations and government agencies face massive cyberattacks every day, and they rightfully invest millions to defend their systems. But when everyday individuals are targeted, the cost is far deeper than dollars. Fraud and identity theft leave lasting emotional scars — shaking confidence, trust, and even a sense of safety.

We founded Checktxt on a simple principle: everyone deserves protection. Our mission is to make it easy and affordable for organizations to extend their security beyond their walls — to the employees, customers, and citizens who rely on them.

Because true security isn’t just about data — it’s about people.

Personal:

Based in Los Gatos, CA, Jack has been married for 39 years and raised three children. His personal experience with family members receiving SMS scams inspired Checktxt’s focus on protecting families, not just employees.

Message from Co-founder/CEO Jack Marshall

When I first ventured into cybersecurity back in 2003, a well-respected CISO shared a piece of wisdom that has stuck with me:

“Security is easy if you have the right attitude.

Imagine a glass of water filled halfway. Some will say it’s half empty; others will say it’s half full. In cybersecurity, however, “THE GLASS IS TRYING TO KILL YOU.”

It was a funny thought back then. Organizations were battling self-replicating malware like Code Red, or the Anna Kournikova virus that flooded email servers with endless messages. The stakes felt different.

But then things changed. Cybercrime escalated. What started as disruptive mischief turned into serious financial theft. In 2024, some analyst estimate cybercrime caused $9.1 trillion USD in global damages. If cybercrime were a country, it would rank as the world’s third-largest economy, trailing only the U.S. and China.

People aren’t laughing anymore. If you know someone who’s been a victim, you understand that the impact goes far beyond financial loss. The stress, anxiety, and sheer time drain can be overwhelming. I’ve met people whose lives were turned upside down — often at the worst possible moments, like just before a vacation or while planning a wedding. Their stories are heartbreaking.

This service is designed to help prevent such experiences. It exists as a free service for everyone — whether you’re non-technical, older, or simply a good person trying to stay safe online. Our goal is to provide simple, effective protection to keep you and your loved ones from becoming victims.

Stay safe,

Jack Marshall

Our Advisory Board

Cybersecurity Industry Veterans:

  • Former CISOs from Fortune 500 companies
  • Academic researchers in mobile security
  • FTC consumer protection specialists
  • Election security and integrity experts

Technical Innovation Council:

  • AI/ML researchers from leading universities
  • Mobile carrier security specialists
  • Threat intelligence professionals
  • Privacy and civil liberties advocates

Areas of Expertise: Deep Specialized Knowledge

SMS Threat Intelligence

Political Donation Fraud Specialists

  • Only security company with specialized political scam database
  • Nonpartisan approach protecting all political affiliations
  • Election cycle expertise with surge capacity planning
  • Coordination and integrations with FEC, Open Secrets and ProPublica

AI-Powered Threat Detection

  • Patent-pending CHAI engine (USPTO 63778,679)
  • Compound AI architecture analyzing multiple threat vectors
  • Behavioral pattern recognition identifying emerging attack methods
  • Continuous learning from global threat intelligence

Mobile Security Architecture

  • Zero-friction deployment without app installation requirements
  • Cross-platform compatibility across all devices and carriers
  • Privacy-first design with minimal data collection
  • Enterprise-grade scalability supporting millions of users
  • Can be used with SMS, WhatsApp, Signal, Discord, or email.

Industry Vertical Expertise

Financial Services Security

  • Strengthen compliance by proactively protecting customers
  • Prevent wire transfer and payment redirection fraud
  • Reduce account takeover risk
  • Gain visibility into attacks targeting your customers

Healthcare and HIPAA Compliance

  • Enhance security posture and support HIPAA compliance
  • Gain visibility into attacks targeting patients or your organization
  • Strengthen telehealth communication security
  • Increase patient confidence and trust

Government and Election Security

  • FISMA compliance for federal agencies
  • FedRAMP cloud security requirements
  • Election integrity and voter protection
  • Emergency communication security

Managed Security Service Providers

  • Multi-tenant architecture design
  • White-label partnership programs
  • Revenue optimization strategies
  • Client retention and expansion

Professional Organizations – Law firms, Private bankers, CPAs…

  • Protect against data leakage and financial fraud
  • Build trust with clients by offering a unique security service
  • Safeguard confidential communications from impersonation and phishing
  • Reduce the risk of unauthorized instructions, wire requests, or sensitive data disclosures
  • Enhance compliance posture across client-sensitive industries (FINRA, SEC, ABA, etc.)

Real Estate Brokerages and Title Companies

  • Prevent closing-stage fraud, including wire-transfer redirection and impersonation attacks
  • Build trust with clients by offering a unique security service
  • Verify the legitimacy of time-sensitive messages, reducing confusion and delays
  • Protect clients from scammers posing as agents, lenders, or title officers
  • Enhance your firm’s reputation for safety and professionalism throughout the transaction

Data Security & Privacy: Your Trust, Our Foundation

Privacy-First Architecture

What We DON’T Collect (and we definitely DO NOT sell your data):

  • No personal information beyond submitted message content
  • No contact lists or address book access
  • No location data or device tracking
  • No behavioral profiling or usage analytics
  • No account creation or password storage

What We DO Analyze:

  • Message content for threat indicators only
  • Sender information for pattern recognition
  • Embedded links for malicious destination detection
  • Metadata patterns for attack vector identification

Data Lifecycle Management:

  • Immediate deletion after analysis completion
  • We store all messages for training
  • Encrypted transmission for all communications
  • Secure disposal of all temporary data